Lightning Talks

Description

Lightning Talks are short lectures (almost) any congress participant may give!

Content

Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick! To get an idea what Lightning Talks are about and how they work, look at last year's sessions at [1].

Contents

Registration

Lightning talk registrations are open! Click "Create lightning talk page" on the navbar to the left and follow the instructions. Don't forget to mail us a link to your Lightning Talk page, as stated in the instructions. There is no registration deadline. We assign timeslots on a first-come, first-served basis, so if you plan on giving your talk on a specific day, submit your slides as soon as possible. Preliminary slides are okay, but remember to update them on the day before your talk. If you have any questions, please send a mail to the Lightning Talk team. We speak English and German.

Schedule

Lightning talk sessions are offered on Day 2, Day 3 and Day 4 of the congress, in Hall G. Each sessions starts at 12:45 and ends at 15:00. There will be a break of 15 minutes from 13:45 to 14:00 in each session.

At FairLötet, we believe that hackers have the power to change the imbalances created by globalisation. A bunch of nerds like us helped create a soldering wire that is free of human exploitation, so you’ll be able to do much greater things. In this talk we’ll try to give you some ideas.

In most of current legal frameworks makers sharing instructions on modification and repair of patented devices may face legal threats. In order to prevent that, we are starting a discussion on a new legal framework – a patent exception for makers and making. It would cover non-commercial uses of patented solutions, their modifying, and sharing information with others both online and offline (within local communities). We called it “Greenlight”. The proposal of the Greenlight includes establishing a database where makers could publish their projects eligible for the framework's protection. By creating a non-compulsory central database, Greenlight would also improve the cooperation between makers and patent authorities. This would allow creating a new reliable source for patent examination.

There no simple go to place for real information wrt to protection and response to cases of digital stalking, but also the information needed is very country specific. However there are clear areas that need to be addressed, regardless of country, and we propose the creation of a Pan-European protocol on digital stalking which we will begin at a self organised session here at 32C3.

QtPass is a multi-platform GUI for pass, the standard unix password manager. We have been developing this over the last year and are now on stable 1.x version. There is heavy use of the project in many places including the network team at techinc. We're always looking for feedback, feature suggestions and new translations!

Wi-Fi hacking often requires using a notebook which makes you look suspicous and is tedious. Using a smartphone is way more convenient. We build NexMon, which enables the monitor mode for the build in Wi-Fi chip of your Nexus 5

Let's write some simple story driven exploit challenges to get people into the community, the way of thinking. Let's make them curious, teach them to look behind the scenes and question how things work.

Sonic Pi combines an electronic synthesizer with a ruby interpreter to create a new kind of electronic instrument. Usable by school children ages 8 and up, it teaches how to code through the joy of making music. It comes pre-installed on Raspbian, but it can be used on any Linux, Windows or OS X computer.

nordlicht is a tool that converts video files into colorful barcodes. nordlicht is free software, supports a large number of styles, and is optimized for speed. It comes with a software library written in C that allows for easy integration into other programs.

The West as we know it is disintegrating before our eyes, paranoia is the new zeitgeist and the prayer of our time is "may tomorrow be no worse than today".

What doesn't blow you up will probably take your rights or put you in prison, every change is another tooth down on the ratchet.
We have lost our way because we have lost our dream.
Communism, Capitalism, even Facism were dreams.

But all of them have failed and without any vision for the future, we are left today grasping at pieces of these broken ideals.

This presentation is about repetition, emulation, and tradition in contemporary Islamic society. It explores these ideas through the lens of aesthetics and political affect on global Muslim culture. The goal is to understand certain patterns in Muslim youth culture and its articulation into political instability, and the intellectual causes of physical conflict.

EasyRPG is an open source replacement of the RPG Maker 2000/2003 engine and editor. This talk gives a short overview about the history of RPG Maker 2000 and introduces EasyRPG Player, our reimplementation of the 2k/2k3 engine.

Panopticon is an open source game of data & control originally created for Brighton CryptoFestival. Learn more about the game, play it or fork it...
Play Panopticon and become a data controller! build your data empire, the tallest tower from which to view the entire internet and control how content and personal data moves. You may have good intentions, or bad ones. Behind the virtual air we breathe are the people who control us – the battle for data and people’s very identities is being fought. What will YOU choose to do?

Geocoding is the technical process of transforming an address or description of a place into a geo coordinate. In order to do so effectively, we need to collect definitions of address and query formats from around the world.

Different people have different understandings of cyber security. Based on this mental model these people might need different tools for work. My research tries to look at those differences and how this might be a factor in the design of a cyber security dashboard

BalCCon 2k16 - Balkan Computer Congress has been conceptualized as a three day gathering of the international hacker community in the organization of LUGoNS – Linux users of Novi Sad and Wau Holland Foundation. The first part of the program has been envisaged to be a set of presentations, workshops and lectures on the current topics regarding privacy, technology, software development, free software & socio-political issues. Our goal is to gather all the communities from the region, continent and the World in an effort to hack, play, learn, pass knowledge and exchange experience. BalCCon aims to become the central hacker community in South East Balkan, as well as to provide the opportunity for all the people in this part of Europe to connect and to cooperate.

strichliste (ʃtʀɪçˈlɪstə, German word for tally sheet) is a tool to replace a tally sheet inside a hackerspace. It's mainly developed by members of the backspace ,hackerspace in bamberg.
It’s aim is to provide a no-frills, easy-to-setup and -to-use solution for managing your organization’s snack bar.

Today, we can found a lot of software, Firewall that are able to intercept encrypted web traffic. We can found that kind of system in some company for exemple (Fortinet...).
With CheckMyHTTPS, we offer the possibility to detect if an encrypted web traffic is intercepted.

'This is an introduction to how internet governance such as ICANN, IGF, and policy works, and how to *hack* it."
Where can techies find the politicians, civil society members and others who have decisions making powers in making policy? In Internet governance venues such as IGF, you can meet and talk to those people that make the policies that seem never made sense. For example, you can meet those governments like the UK that want to ban encrypted messaging and argue with them whether not backdoors make any sense. After all, for more than 20 years encryption, we're pretty sure even the best government labs can't break what has been readily available, but there is still an assumption that governments can just make encrypted messages illegal! So, could techies tell Cameron why he cannot stop encrypted messaging by just banning services through passing a law? We think you can, by attending Internet Governance Forum and other similar internet governance forums, and by participating in various documents they produce, by telling them when they are wrong and the laws they want to pass are not possible to technically be implemented. You can also talk to those that come up with policies that affect the Domain Name System by participating at ICANN. Or even, if you can be bothered, get involved with policy-making! You can help the civil society and activists in better understanding the technical dynamics and perhaps come up with real solutions to problems such as limitation on freedom of expression. You can bring reality to those policy discussions, after all it is coders like you that actually know how the Internet works!

Eleza.org is an open platform for individuals and NGOs to share and find solutions to global issues. Need to know how to run a refugee shelter, how to dig a well, or how to best help in a crisis as a private citizen? Eleza.org is (will be) for you. Want to help us make this happen? Come to this talk and find me afterwards!

Circles is a blockchain based currency that implements an universal basic income. To overcome the Sybil attack problem in a decentralized manner it uses web of trust like mechanics. The current implementation is based on Ethereum.

I am working on some incentivized mesh network protocols. In an incentivized mesh network, routers are automatically paid by the network to forward packets. This eliminates the role of the ISP in providing internet service.

Universal payment channels allow for instant, programmable payments sent from one peer to another. Each individual payment does not involve a bank or a blockchain, meaning that they are faster and more scalable than any previous electronic payment method. The protocol is similar to the bitcoin lightning network, but it can use real money, and Turing-complete smart contracts. Individual payments are totally anonymous, and each member of the network knows very little about the others.

Reactive payment routing routes payments through a multihop payment channel network, such as the bitcoin lightning network, or a universal payment channels network. It is based on techniques used in AODV and Guntella, and finds the cheapest route for a payment, across currencies if necessary.

The joint release of Perl 6 with GNU/Hurd was canceled: Perl 6 is scheduled to be released this Christmas. Enjoy a new feature-rich, expressive and multiparadigmatic language with optional and gradual typing. You will love the overhauled composable regular expressions.

systems are fulfilled with usage of pre-existing Linux mechanisms, like
LSM or DAC and new ones, like Cynara and Security Manager. You will have
a chance to learn the security models implemented in some mobile devices, and get
to know how well designed solution can provide security and privacy for whole

BorgBackup (short: Borg) is a deduplicating backup program. Optionally, it supports compression and authenticated encryption.
The main goal of Borg is to provide an efficient and secure way to backup data. The data deduplication technique used makes Borg suitable for daily backups since only changes are stored. The authenticated encryption technique makes it suitable for backups to not fully trusted targets.

IPFS is a new hypermedia distribution protocol, addressed by content and identities. IPFS enables the creation of completely distributed applications and aims to make the web faster, safer, and more open. It does this by offering a peer-to-peer distributed file system that in some ways is similar to the web, but could also be seen as a single BitTorrent swarm that is exchanging objects within one Git repository.

Hackbases<1> are open infrastructure you can live and hack in, for short, mid or long term. They started appearing after around 2011. They provide a foundation for nomadic hacker lifestyles full of excitement and international intrigue.

The talk comes from the experience of my last 4 years. I have been spending the cold half of the year mostly in the Lanzarote Hackbase<2> (CHT / totalism.org) and the warm half in European metropolae (Berlin, London, Paris, Hamburg, Brussels, Amsterdam, Ljubljana, Helsinki, etc). I will also present some necessary systematics I am curating: the EU scene calendar<3>, maps<4>, list of spaces<5>, etc.

Talk about how low cost farm robots will replace chemicals for plant protection. Based on longer presentation delivered originally on December 1st 2015 at the European Landowners Organization Innovation Conference in Brussels